1.0 - The file permissions, ownership, and group membership of system files and commands must match the vendor values. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.2 - The cryptographic hash of system files and commands must match vendor values. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS CentOS 6 Server L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 16.04 LTS Workstation L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Amazon Linux 2 v1.0.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Oracle Linux 6 Workstation L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS CentOS 6 Workstation L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 16.04 LTS Server L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure filesystem integrity is regularly checked | CIS Amazon Linux v2.1.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Implement Periodic Execution of File Integrity '/var/spool/cron/root - 0 5 * * * /usr/sbin/aide --check' | CIS Red Hat Enterprise Linux 5 L2 v2.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked | CIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked - aidecheck.service status | CIS Oracle Linux 8 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked - aidecheck.service status | CIS Oracle Linux 8 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked - aidecheck.timer status | CIS Oracle Linux 8 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked - aidecheck.timer status | CIS Oracle Linux 8 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.4.2 Ensure filesystem integrity is regularly checked - cron | CIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.030 - A file integrity tool must verify the baseline operating system configuration at least weekly - cron | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.040 - Designated personnel must be notified if baseline configurations are changed in an unauthorized manner. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.1600 - The file integrity tool must be configured to verify Access Control Lists (ACLs). | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.1610 - The file integrity tool must be configured to verify extended attributes. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.18 System Integrity Protection status | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.18 System Integrity Protection status | CIS Apple macOS 11 v1.1.0 L1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.19 System Integrity Protection status | CIS Apple macOS 10.13 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.20 System Integrity Protection status | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.20 System Integrity Protection status | CIS Apple macOS 10.12 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.23 System Integrity Protection status | CIS Apple macOS 10.13 L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Amazon Linux 2 STIG v1.0.0 L2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Amazon Linux 2 v1.0.0 L2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS CentOS Linux 8 Server L2 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS SUSE Linux Enterprise 15 Workstation L2 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Amazon Linux v2.1.0 L2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS CentOS Linux 8 Workstation L2 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Oracle Linux 6 Server L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Oracle Linux 6 Workstation L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Red Hat 6 Server L2 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Red Hat EL7 Server L2 v3.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Red Hat EL8 Workstation L2 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS CentOS 6 Workstation L2 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS CentOS 6 Server L2 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.1.1 Audit system file permissions | CIS Red Hat 6 Workstation L2 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
8.3.2 Implement Periodic Execution of File Integrity | CIS Debian Linux 7 L2 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
8.3.2 Implement Periodic Execution of File Integrity | CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
9.2 Verify System File Permissions | CIS Solaris 11.2 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
9.2 Verify System File Permissions | CIS Solaris 11.1 L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
9.2 Verify System File Permissions | CIS Solaris 11 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
Ensure filesystem integrity is regularly checked | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | SYSTEM AND INFORMATION INTEGRITY |